You made it! Now, time we put the rubber to the road and run one of these vuln scans ourselves. We’ve built an environment with some worrisome vulnerabilities we’re hoping you can identify, so please help us out. You’ll conduct a scan on two servers: an internal host running Jenkins, an automation server for building, testing and deploying code; and an external web server that hosts your company’s main website. We’ve suffixed the hostnames of these machines with .int if they are internal, and .com if they are external.
Go on, get scanning!